Protect your organization with the Audit Log section, where you can view the records of all types of actions performed by users within the software.
With Pirani's audit log, you will be able to protect the organization and perform audits on what is happening in the system since it is where all the actions performed by a user are logged and recorded. This will facilitate the monitoring of failed actions, the analysis of events, and the supervision of actions that may affect security or operations.
Note: The logs cannot be edited or deleted by the user, as they are only visualizations that facilitate and allow monitoring actions in the organization.
→ This functionality is available from the Enterprise plan ⚡
Where do I find the Audit Log?
To find this section, you must click on the top left, on the dots next to the Pirani logo. There, you will see a box in which you must click on the "Manage organization" section.
On the right side, you will find several options to manage your organization. Now click on the "Security" option. Here, you will find all the functionalities to care for and protect your organization. Click on the "Audit Log" section.
What will you find in the Audit Log?
In this section, you can view the logs of all user actions. To do so, choose a user and click on the "See more" option, here you will find the following information:
Date: The day, month, year, and time when the action was performed.
User: The email and name of the user who acted.
Action: The type of action performed and whether it was successful or unsuccessful. These actions can be login, creation, and deletion, among others.
Record identifier: The name of the record to which the action was applied, along with the code identifying the affected record.
Module: The section or module where the action was taken.
System: The management system that the change affected; this could be Transversal (i.e., changes in the organization), AML, ISMS, Compliance, ORM, and Audit management.
Options: Click on see more. Here, you can find the IP address and, when there is a failure, the description of the failure.
How can I filter the audit log records?
You can filter the logs and thus facilitate access to information according to security needs and processes. Filter by:
Security logs: These logs contain all actions related to information security issues, such as login, logout, role change, and adding and deleting users. The IP addresses appear in these logs.
General logs: All actions related to the operation of risk management, such as creating risks, processes, and controls and editing action plans.
Date: Filter the records in time ranges by year, month, last seven days, or today, or customize the date range of the records you wish to visualize.
User: Filter records are created by users in the organization.
Action: Filter records by the type of actions performed, such as creation, update, and deletion, among others.
System: Filter by the management system you want to analyze; this filter is essential for organizations with multiple management systems.
Modules: Filter according to the module where the action has been performed. You can find specific sections and actions here, such as password management, asset criticality rating, list query, and more.
How can I download the information?
You can download the audit information in Excel format. To do so, click on the "Download" button at the top right and choose whether to download only the records on the current page or all of them.
Additionally, at the bottom right, you will find a button to choose whether to display 25, 50, or 100 records per page.
Refresh button
Finally, at the top right, you will find the "Refresh" button, which shows how long it has been without refreshing and, when clicked, shows the new records.